Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Physical Sciences and Mathematics

Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero Dec 2022

Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero

Electronic Theses and Dissertations

Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets.

In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with …


Opinion Mining Of Bird Preference In Wildlife Parks, Isiwat Adenopo Dec 2022

Opinion Mining Of Bird Preference In Wildlife Parks, Isiwat Adenopo

Electronic Theses and Dissertations

Opinion Mining is becoming the fastest growing area to extract useful and insightful information to support decision making. In the age of social media, user’s opinions and discussions have become a highly valuable source to look for users preferences, likes, and dislikes.

The industry of wildlife parks (or zoos) is a competitive domain that requires careful analysis of visitor’s opinions to understand and cater for their preferences when it comes to wildlife. In this thesis, an opinion mining approach was proposed and applied on textual posts on the social media platform, Twitter, to extract the popularity, polarity (sentiment), and emotions …


The Role Of Generative Adversarial Networks In Bioimage Analysis And Computational Diagnostics., Ahmed Naglah Dec 2022

The Role Of Generative Adversarial Networks In Bioimage Analysis And Computational Diagnostics., Ahmed Naglah

Electronic Theses and Dissertations

Computational technologies can contribute to the modeling and simulation of the biological environments and activities towards achieving better interpretations, analysis, and understanding. With the emergence of digital pathology, we can observe an increasing demand for more innovative, effective, and efficient computational models. Under the umbrella of artificial intelligence, deep learning mimics the brain’s way in learn complex relationships through data and experiences. In the field of bioimage analysis, models usually comprise discriminative approaches such as classification and segmentation tasks. In this thesis, we study how we can use generative AI models to improve bioimage analysis tasks using Generative Adversarial Networks …


Performance Enhancement Of Hyperspectral Semantic Segmentation Leveraging Ensemble Networks, Nicholas Soucy Dec 2022

Performance Enhancement Of Hyperspectral Semantic Segmentation Leveraging Ensemble Networks, Nicholas Soucy

Electronic Theses and Dissertations

Hyperspectral image (HSI) semantic segmentation is a growing field within computer vision, machine learning, and forestry. Due to the separate nature of these communities, research applying deep learning techniques to ground-type semantic segmentation needs improvement, along with working to bring the research and expectations of these three communities together. Semantic segmentation consists of classifying individual pixels within the image based on the features present. Many issues need to be resolved in HSI semantic segmentation including data preprocessing, feature reduction, semantic segmentation techniques, and adversarial training. In this thesis, we tackle these challenges by employing ensemble methods for HSI semantic segmentation. …


Mathematical Models Yield Insights Into Cnns: Applications In Natural Image Restoration And Population Genetics, Ryan Cecil Aug 2022

Mathematical Models Yield Insights Into Cnns: Applications In Natural Image Restoration And Population Genetics, Ryan Cecil

Electronic Theses and Dissertations

Due to a rise in computational power, machine learning (ML) methods have become the state-of-the-art in a variety of fields. Known to be black-box approaches, however, these methods are oftentimes not well understood. In this work, we utilize our understanding of model-based approaches to derive insights into Convolutional Neural Networks (CNNs). In the field of Natural Image Restoration, we focus on the image denoising problem. Recent work have demonstrated the potential of mathematically motivated CNN architectures that learn both `geometric' and nonlinear higher order features and corresponding regularizers. We extend this work by showing that not only can geometric features …


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Role Of Deep Learning Techniques In Non-Invasive Diagnosis Of Human Diseases., Hisham Abouelseoud Elsayem Abdeltawab Aug 2022

Role Of Deep Learning Techniques In Non-Invasive Diagnosis Of Human Diseases., Hisham Abouelseoud Elsayem Abdeltawab

Electronic Theses and Dissertations

Machine learning, a sub-discipline in the domain of artificial intelligence, concentrates on algorithms able to learn and/or adapt their structure (e.g., parameters) based on a set of observed data. The adaptation is performed by optimizing over a cost function. Machine learning obtained a great attention in the biomedical community because it offers a promise for improving sensitivity and/or specificity of detection and diagnosis of diseases. It also can increase objectivity of the decision making, decrease the time and effort on health care professionals during the process of disease detection and diagnosis. The potential impact of machine learning is greater than …


Solving The Challenges Of Concept Drift In Data Stream Classification., Hanqing Hu Aug 2022

Solving The Challenges Of Concept Drift In Data Stream Classification., Hanqing Hu

Electronic Theses and Dissertations

The rise of network connected devices and applications leads to a significant increase in the volume of data that are continuously generated overtime time, called data streams. In real world applications, storing the entirety of a data stream for analyzing later is often not practical, due to the data stream’s potentially infinite volume. Data stream mining techniques and frameworks are therefore created to analyze streaming data as they arrive. However, compared to traditional data mining techniques, challenges unique to data stream mining also emerge, due to the high arrival rate of data streams and their dynamic nature. In this dissertation, …


The Contribution Of Ethical Governance Of Artificial Intelligence & Machine Learning In Healthcare, Tina Nguyen May 2022

The Contribution Of Ethical Governance Of Artificial Intelligence & Machine Learning In Healthcare, Tina Nguyen

Electronic Theses and Dissertations

With the Internet Age and technology progressively advancing every year, the usage of Artificial Intelligence (AI) along with Machine Learning (ML) algorithms has only increased since its introduction to society. Specifically, in the healthcare field, AI/ML has proven to its end-users how beneficial its assistance has been. However, despite its effectiveness and efficiencies, AI/ML has also been under scrutiny due to its unethical outcomes. As a result of this, two polarizing views are typically debated when discussing AI/ML. One side believes that AI/ML usage should continue regardless of its unsureness, while the other side argues that this technology is too …


Risk Gameplay Analysis Using Stochastic Beam Search, Jacob Gillenwater May 2022

Risk Gameplay Analysis Using Stochastic Beam Search, Jacob Gillenwater

Electronic Theses and Dissertations

Hasbro’s RISK, first published in 1959, is a complex multiplayer strategy game that has received little attention from the scientific community. Training artificial intelligence (AI) agents using stochastic beam search gives insight into effective strategy when playing RISK. A comprehensive analysis of the systems of play challenges preconceptions about good strategy in some areas of the game while reinforcing those preconceptions in others. This study applies stochastic beam search to discover optimal strategies in RISK. Results of the search show both support for and challenges to traditionally held positions about RISK gameplay. While stochastic beam search competently investigates gameplay on …


Modeling And Debiasing Feedback Loops In Collaborative Filtering Recommender Systems., Sami Khenissi May 2022

Modeling And Debiasing Feedback Loops In Collaborative Filtering Recommender Systems., Sami Khenissi

Electronic Theses and Dissertations

Artificial Intelligence (AI)-driven recommender systems have been gaining increasing ubiquity and influence in our daily lives, especially during time spent online on the World Wide Web or smart devices. The influence of recommender systems on who and what we can find and discover, our choices, and our behavior, has thus never been more concrete. AI can now predict and anticipate, with varying degrees of accuracy, the news article we will read, the music we will listen to, the movies we will watch, the transactions we will make, the restaurants we will eat in, the online courses we will be interested …


Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala May 2022

Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala

Electronic Theses and Dissertations

Power grids have rapidly evolved into Smart grids and are heavily dependent on Supervisory Control and Data Acquisition (SCADA) systems for monitoring and control. However, this evolution increases the susceptibility of the remote (VMs, VPNs) and physical interfaces (sensors, PMUs LAN, WAN, sub-stations power lines, and smart meters) to sophisticated cyberattacks. The continuous supply of power is critical to power generation plants, power grids, industrial grids, and nuclear grids; the halt to global power could have a devastating effect on the economy's critical infrastructures and human life.

Machine Learning and Deep Learning-based cyberattack detection modeling have yielded promising results when …


A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz May 2022

A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz

Electronic Theses and Dissertations

Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version.

In this work, we develop an …


Beyond Accuracy In Machine Learning., Aneseh Alvanpour May 2022

Beyond Accuracy In Machine Learning., Aneseh Alvanpour

Electronic Theses and Dissertations

Machine Learning (ML) algorithms are widely used in our daily lives. The need to increase the accuracy of ML models has led to building increasingly powerful and complex algorithms known as black-box models which do not provide any explanations about the reasons behind their output. On the other hand, there are white-box ML models which are inherently interpretable while having lower accuracy compared to black-box models. To have a productive and practical algorithmic decision system, precise predictions may not be sufficient. The system may need to have transparency and be able to provide explanations, especially in applications with safety-critical contexts …


New Debiasing Strategies In Collaborative Filtering Recommender Systems: Modeling User Conformity, Multiple Biases, And Causality., Mariem Boujelbene May 2022

New Debiasing Strategies In Collaborative Filtering Recommender Systems: Modeling User Conformity, Multiple Biases, And Causality., Mariem Boujelbene

Electronic Theses and Dissertations

Recommender Systems are widely used to personalize the user experience in a diverse set of online applications ranging from e-commerce and education to social media and online entertainment. These State of the Art AI systems can suffer from several biases that may occur at different stages of the recommendation life-cycle. For instance, using biased data to train recommendation models may lead to several issues, such as the discrepancy between online and offline evaluation, decreasing the recommendation performance, and hurting the user experience. Bias can occur during the data collection stage where the data inherits the user-item interaction biases, such as …


Robot Learning From Human Observation Using Deep Neural Networks, Michael Elachkar Feb 2022

Robot Learning From Human Observation Using Deep Neural Networks, Michael Elachkar

Electronic Theses and Dissertations

Industrial robots have gained traction in the last twenty years and have become an integral component in any sector empowering automation. Specifically, the automotive industry implements a wide range of industrial robots in a multitude of assembly lines worldwide. These robots perform tasks with the utmost level of repeatability and incomparable speed. It is that speed and consistency that has always made the robotic task an upgrade over the same task completed by a human. The cost savings is a great return on investment causing corporations to automate and deploy robotic solutions wherever feasible.

The cost to commission and set …


Classification Of Electropherograms Using Machine Learning For Parkinson’S Disease, Soroush Dehghan Jan 2022

Classification Of Electropherograms Using Machine Learning For Parkinson’S Disease, Soroush Dehghan

Electronic Theses and Dissertations

Parkinson’s disease (PD) is a neurodegenerative movement disorder that progresses gradually over time. The onset of symptoms in people who are suffering from PD can vary from case to case, and it depends on the progression of the disease in each patient. The PD symptoms gradually develop and exacerbate the patient’s movements throughout time. An early diagnosis of PD could improve the outcomes of treatments and could potentially delay the progression of this disorder and that makes discovering a new diagnostic method valuable. In this study, I investigate the feasibility of using a machine learning (ML) approach to classify PD …


Frequency Analysis Of Trabecular Bone Structure, Daniel Parada San Martin Jan 2022

Frequency Analysis Of Trabecular Bone Structure, Daniel Parada San Martin

Electronic Theses and Dissertations

Medical data is hard to obtain due to privacy laws making research difficult. Many databases of medical data have been compiled over the years and are available to the scientific community. These databases are not comprehensive and lack many clinical conditions. Certain type of medical conditions are rare, making them harder to obtain, or are not present at all in the aforementioned databases. Due to the sparsity or complete lack of data regarding certain conditions, research has stifled. Recent developments in machine learning and generative neural networks have made it possible to generate realistic data that can overcome the lack …


Digital Searching: A Grounded Theory Study On The Modern Search Experience, Nicolas Armando Parés Jan 2022

Digital Searching: A Grounded Theory Study On The Modern Search Experience, Nicolas Armando Parés

Electronic Theses and Dissertations

This Grounded theory study explores US adults' modern information search process as they pursue information through digital search user interfaces and tools. To study the current search process, a systematic grounded theory methodology and two data collection methods, a think-aloud protocol and semi-structured interviews, are used to develop the theory. The emerging theory addressed two tightly connected research questions that asked, “What is the process by which humans search and discover information?” and “What is the process by which search and discovery interfaces and tools support the modern search process?”

The study collects participant data from US adults who have …


Local-Global Results On Discrete Structures, Alexander Lewis Stevens Jan 2022

Local-Global Results On Discrete Structures, Alexander Lewis Stevens

Electronic Theses and Dissertations

Local-global arguments, or those which glean global insights from local information, are central ideas in many areas of mathematics and computer science. For instance, in computer science a greedy algorithm makes locally optimal choices that are guaranteed to be consistent with a globally optimal solution. On the mathematical end, global information on Riemannian manifolds is often implied by (local) curvature lower bounds. Discrete notions of graph curvature have recently emerged, allowing ideas pioneered in Riemannian geometry to be extended to the discrete setting. Bakry- Émery curvature has been one such successful notion of curvature. In this thesis we use combinatorial …


Could Alexa Increase Your Social Worth?, Peter Tripp Jan 2022

Could Alexa Increase Your Social Worth?, Peter Tripp

Electronic Theses and Dissertations

People have historically used personal introductions to build social capital, which is the foundation of career networking and is perhaps the most effective way to advance a career (Lin, 2001). With societal changes, such as the pandemic (Venkatesh & Edirappuli, 2020), and the increasing capabilities of Artificial Intelligence (AI), new approaches may emerge that impact societal relationships. Social capital theory highlights the need for reciprocal agreements to establish the trust between parties (Gouldner, 1960). My theoretical prediction and focus of this research include two principles: The impact of reciprocity in evaluating trust of the source of the introduction and the …


Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp, Afnan Mohammed Albahli Jan 2022

Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp, Afnan Mohammed Albahli

Electronic Theses and Dissertations

Smart Home Systems (SHS) are some of the most popular Internet of Things (IoT) applications. In 2021, there were 52.22 million smart homes in the United States and they are expected to grow to 77.1 million in 2025 [71]. According to MediaPost [74], 69 percent of American households have at least one smart home device. The number of smart home systems poses a challenge for software testers to find the right approach to test these systems. This dissertation employs Extended Finite State Machines (EFSMs) [6, 24, 105], Communicating Extended Finite State Machines (EFSMs) [68] and FSMApp [10] to generate reusable …


Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto Jan 2022

Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto

Electronic Theses and Dissertations

Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …


A Blockchain-Based Privacy-Preserving Physical Delivery System, Shahin Zanbaghi Jan 2022

A Blockchain-Based Privacy-Preserving Physical Delivery System, Shahin Zanbaghi

Electronic Theses and Dissertations

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. This work presents a novel approach for online buyers to have a trusted, decentralized, privacy-preserved physical assets delivery solution. The proposed solution focuses on privacy-preserving personal information in delivering physical assets between sellers and buyers. Our primary approach is to prevent sellers and agents (responsible for ensuring the asset delivery is …


Human-Machine Collaboration In Healthcare Innovation, Breeze Fenton Jan 2022

Human-Machine Collaboration In Healthcare Innovation, Breeze Fenton

Electronic Theses and Dissertations

Almost every individual has visited a healthcare institute, whether for an annual checkup, surgery, or a nursing home. Ensuring healthcare institutes are using human-machine collaboration systems correctly can improve daily operations. A maturity assessment and an implementation plan have been developed to help healthcare institutes monitor the human-machine collaboration systems. A maturity model, the Smart Maturity Model for Health Care (SMMHC), is a tool designed for maturity assessment. A four-step implementation plan was also created in this research. The implementation plan views the maturity of the institute and develops a strategy on how to improve it. The research utilized Integrated …


Graph Realizability And Factor Properties Based On Degree Sequence, Daniel John Jan 2022

Graph Realizability And Factor Properties Based On Degree Sequence, Daniel John

Electronic Theses and Dissertations

A graph is a structure consisting of a set of vertices and edges. Graph construction has been a focus of research for a long time, and generating graphs has proven helpful in complex networks and artificial intelligence.

A significant problem that has been a focus of research is whether a given sequence of integers is graphical. Havel and Hakimi stated necessary and sufficient conditions for a degree sequence to be graphic with different properties. In our work, we have proved the sufficiency of the requirements by generating algorithms and providing constructive proof.

Given a degree sequence, one crucial problem is …


Identifying Network Biomarkers For Each Breast Cancer Subtypes Along With Their Effective Single And Paired Repurposed Drugs Using Network-Based Machine Learning Techniques, Forough Firoozbakht Jan 2022

Identifying Network Biomarkers For Each Breast Cancer Subtypes Along With Their Effective Single And Paired Repurposed Drugs Using Network-Based Machine Learning Techniques, Forough Firoozbakht

Electronic Theses and Dissertations

Breast cancer is a complex disease that can be classified into at least 10 different molecular subtypes. Appropriate diagnosis of specific subtypes is critical for ensuring the best possible patient treatment and response to therapy. Current computational methods for determining the subtypes are based on identifying differentially expressed genes (i.e., biomarkers) that can best discriminate the subtypes. Such approaches, however, are known to be unreliable since they yield different biomarker sets when applied to data sets from different studies. Gathering knowledge about the functional relationship among genes will identify “network biomarkers” that will enrich the criteria for biomarker selection. Cancer …


Speed Offset Attack Detection In Vehicular Ad-Hoc Networks (Vanets) Using Machine Learning, Bhuiyan Mustafa Tawheed Jan 2022

Speed Offset Attack Detection In Vehicular Ad-Hoc Networks (Vanets) Using Machine Learning, Bhuiyan Mustafa Tawheed

Electronic Theses and Dissertations

An integral component of the Intelligent Transportation System (ITS) is the emerging technology called Vehicular ad-hoc network (VANET). VANET allows Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication wirelessly to improve road safety, traffic congestion, and information dissemination. Communication of vehicles in a VANET network is vulnerable to various attacks. Commonly used cryptographic techniques alone are insufficient to ensure and protect vehicle message integrity and authentication from insider attacks. In such cases, additional measures are necessary to ensure the correctness of the transmitted data. Each vehicle in the network periodically broadcasts a basic safety message (BSM) that contains …


Enhancing Multi-View 3d-Reconstruction Using Multi-Frame Super Resolution, Michael Lee Jan 2022

Enhancing Multi-View 3d-Reconstruction Using Multi-Frame Super Resolution, Michael Lee

Electronic Theses and Dissertations

Multi-view stereo is a popular method for 3D-reconstruction. Super resolution is a technique used to produce high resolution output from low resolution input. Since the quality of 3D-reconstruction is directly dependent on the input, a simple path is to improve the resolution of the input.

In this dissertation, we explore the idea of using super resolution to improve 3D-reconstruction at the input stage of the multi-view stereo framework. In particular, we show that multi-view stereo when combined with multi-frame super resolution produces a more accurate 3D-reconstruction.

The proposed method utilizes images with sub-pixel camera movements to produce high resolution output. …